ryantig / grepcidr
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks
☆26Updated last year
Related projects ⓘ
Alternatives and complementary repositories for grepcidr
- ☆15Updated 2 years ago
- Security Alert Decoration☆26Updated this week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆21Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 3 years ago
- egrets monitors egress☆45Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- ☆48Updated 7 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Source code and examples for Antignis☆36Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Updated 2 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆81Updated last month
- ☆21Updated 3 years ago
- ssh jump host appliance☆25Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆13Updated 7 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 2 months ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆10Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆47Updated 2 years ago
- ☆42Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A modern CLI for Tenable.io written in Go☆14Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- A Passive SSH back-end and scanner.☆102Updated 5 months ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆47Updated 2 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago